首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   174篇
  免费   43篇
  国内免费   6篇
  2023年   1篇
  2022年   3篇
  2021年   2篇
  2020年   3篇
  2019年   11篇
  2018年   12篇
  2017年   14篇
  2016年   19篇
  2015年   11篇
  2014年   13篇
  2013年   60篇
  2012年   7篇
  2011年   8篇
  2010年   5篇
  2009年   8篇
  2008年   2篇
  2007年   2篇
  2006年   5篇
  2005年   3篇
  2004年   7篇
  2003年   5篇
  2002年   8篇
  2001年   5篇
  2000年   3篇
  1997年   1篇
  1996年   3篇
  1992年   1篇
  1989年   1篇
排序方式: 共有223条查询结果,搜索用时 93 毫秒
31.
While separatist-related conflict has re-emerged in southern Thailand, there is one predominantly Muslim border province that has remained outside of the conflict. Satun province has been conspicuously unaffected by the Malay-Muslim separatist movement, despite its shared history and ethnic origins with the conflict-affected provinces. In contrast to Pattani, Yala, and Narathiwat, the process of state penetration in Satun was gradual and comparatively less coercive, leading to relative stability and encouraging political and economic integration. This comparative study analyzes the history of cooperative state–minority relations and political stability in Satun province, and draws important lessons directly applicable to the unrest in neighbouring provinces.  相似文献   
32.
This article argues that the debate on security sector reform (SSR) needs to be taken further by taking into consideration the fact that, even though the SSR concept was not originally developed as an element in stabilising states undergoing an insurgency, it is very much being used for exactly that. When conducting counterinsurgency with a focus on the creation of stability, the baseline will ultimately have to be security sector stabilisation (SSS) as a precondition for complete SSR implementation. However, the two must be connected to avoid them undermining each other. This is important if a comprehensive approach to programme implementation and especially sustainability is to guide the programme, and not just isolated ‘train and equip’ stand-alone projects that do not solve either the initial need for stabilisation or the long-term need for accountable security forces. Currently, in Afghanistan the surge for security by the international military is in danger of overtaking the other elements of the SSR, thereby undermining the primary end state and thus risking laying the wrong foundation for the long-term process of SSR.  相似文献   
33.
不确定条件下的不完备信息分析是多属性决策中的主要内容之一,Yang提出的证据推理方法可以较好地处理这类信息。研究了证据推理方法中不完备信息的影响因素,包括规则中的不完备信息,规则的权重以及规则的一致性,并以此为基础分析了评估结果中不完备信息的取值范围,得出了初步结论:评估结果中不完备信息的信度必然小于作为输入的规则中不完备信息中的较大者,但不一定大于其中的较小者。进一步分析了规则一致性的逻辑意义和几何意义,指出规则的一致性实际描述了规则之间的冲突程度。  相似文献   
34.
ABSTRACT

Sectarian militants have for years launched attacks from Pakistan across the border to Iran. Finding sanctuary in a neighbouring country can make the difference between success and failure for militants. Conventional wisdom holds that a lasting transnational militancy challenge would typically create serious interstate conflict. Militancy has triggered armed encounters between Iran and Pakistan. This article argues that despite some tension militancy has resulted in deeper cooperation in the ambivalent dyad. Both states’ overarching security concerns, having exhausted other options, the believed involvement of third-party states, and economic potential, have moderately alleviated negative pressure caused by militancy.  相似文献   
35.
Cyberspace is an avenue of approach through which a military force can attain objectives of value. Through these cyber avenues of approach, military forces can engage, vet, organize, and direct human agents to accomplish specific activities. Although the objectives of these activities could differ from traditional military objectives, they still have military relevance. This particular manifestation of cyber conflict is neither a new domain of war nor something outside of warfare. Rather, it can be viewed as an emerging avenue of approach in the larger context of military operations, auguring benefits in the integration of cyber activities with operations.  相似文献   
36.
Abstract

Post-uprisings Middle East politics is frequently described as a ‘regional cold war’ involving proxy warfare that emphasises the role of shared identities linking external and local actors. But does the ‘content’ of identities impact proxy war dynamics? This article considers the present ‘battle for Syria’, a local conflict that became a theatre for multiple proxy wars involving actors emphasising identities on various levels, most notably national, religious/ sect and ethnic. It suggests that identity content does matter, with global powers more reluctant than regional players to back groups identifying at sub-national level, while foreign non-state actors are enthusiastic backers of sub-national identity.  相似文献   
37.
We model an infinitely repeated Tullock contest, over the sharing of some given resource, between two ethnic groups. The resource is allocated by a composite state institution according to relative ethnic control; hence the ethnic groups contest the extent of institutional ethnic bias. The contest yields the per-period relative influence over institutions, which partly spills over into the next period, by affecting relative conflict efficiency. Our model generates non-monotone evolution of both conflict and distribution. Results suggest that external interventions, when effective in reducing current conflict and protecting weaker groups, may end up sowing the seeds of greater future conflict.  相似文献   
38.
脉冲追赶式同步扫描过程中,双基地雷达的目标分辨力不仅与雷达参数有关,而且还与脉冲追赶进程密切相关.分析了双基地雷达距离、角度和多普勒分辨力的影响因素,并对其在脉冲追赶情况下的变化规律进行分析,结果表明在每一脉冲追赶扫描周期内,双基地雷达的距离分辨力和多普勒分辨力不断提高,而角度分辨力则有所下降.  相似文献   
39.
为满足跳频频率测量中频率估计高精度及实时性的要求,提出了一种将调制FFT和MUSIC算法相结合的频率算法:首先利用调制FFT对谐波频率进行预估计,确定感兴趣的频域区间;然后利用MUSIC算法在锁定区间内估计伪谱谱峰的位置,实现频率的精确估计。该算法可得到较高的频率分辨率,并减少了MUSIC算法的谱峰搜索范围。仿真试验表明:该算法的频率分辨率高,且实时性能满足频率测量需求。  相似文献   
40.
傅里叶望远术中的相位闭合分析及其仿真   总被引:4,自引:0,他引:4       下载免费PDF全文
傅里叶望远术是近年来受到广泛关注的一项主动成像技术.它利用直线干涉条纹对目标的傅里叶频谱进行提取,并利用相位闭合技术消除随机相位,最终获取同步轨道目标的高分辨率图像.对傅里叶望远术的基本理论进行了推导,详细阐述了相位闭合实现方法,并对整个过程进行了计算机模拟.仿真实现了对两个目标的频谱扫描并重建了它们的二维灰度图像,充分验证了傅里望远术的正确性和可行性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号